SecOps Tools and 2021 Security Incidents: Kaseya Ransomware Attack

Cybersecurity    |    Intermediate
  • 11 videos | 56m 52s
  • Includes Assessment
  • Earns a Badge
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Supply chain attacks are particularly stealthy and have the potential to inflict considerable damage that can have lasting repercussions. Cybersecurity professionals need to proactively monitor traffic to stay ahead of these types of attacks and other potential threats. Begin this course by exploring the background of the Kaseya ransomware attack and how it was discovered. Then, examine what led to the breach and how the attack affected Kaseya's clientele of multiple managed service providers (MSPs) and as a result, many small businesses downstream. Investigate the various tools, like SQL injection, that could be used to conduct this type of attack. Finally, take a look at the cybersecurity community response to the breach and the fallout for Kaseya from the event. Once you have completed this course, you should understand the background of the Kaseya ransomware attack, how to use tools to conduct a similar type of attack, and how Kaseya and the government responded to the breach.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the basic background of the attack and what made it possible
    Describe how the attack was discovered and disclosed
    Describe how supply chain attacks work and how this made kaseya an attractive target
    Describe the types of tools used to conduct the attack
    Check for privilege escalation vulnerabilities
  • Evade microsoft defender antivirus protection by obfuscating a powershell script
    Use mimikatz utility to extract the ntlm hash of a user’s credentials from memory in a windows 10 machine
    Describe how kaseya responded to the breach
    Describe the political and cybersecurity community fallout from the ransomware attack
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 54s
  • 5m 6s
  • Locked
    3.  Kaseya Ransomware Attack Discovery
    3m 45s
  • Locked
    4.  Kaseya at the Center of a Supply Chain
    4m 13s
  • Locked
    5.  Tools Used for the Kaseya Ransomware Attack
    8m 55s
  • Locked
    6.  Detecting Privilege Escalation Vulnerabilities
    5m 32s
  • Locked
    7.  Evading Microsoft Defender Protection
    8m 35s
  • Locked
    8.  Extracting Credentials Using Mimikatz
    7m 51s
  • Locked
    9.  Kaseya Ransomware Attack Response
    4m 22s
  • Locked
    10.  Kaseya Ransomware Attack Fallout
    6m 51s
  • Locked
    11.  Course Summary
    50s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.0 of 87 users Rating 4.0 of 87 users (87)
Rating 4.4 of 8 users Rating 4.4 of 8 users (8)
Rating 4.4 of 7 users Rating 4.4 of 7 users (7)